Special Summer Sale - 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dm70dm

H12-891_V1.0 HCIE-Datacom V1.0 Questions and Answers

Questions 4

Which of the following are carried in an HTTP/1.1 response?

Options:

A.

Status line

B.

Response body

C.

Response header

D.

Empty line

Buy Now
Questions 5

Which MPLS label will be used by PE2 for forwarding traffic to 10.0.1.1 based on the following SR-MPLS database?

Given Data (LSDB Information):

    Prefix-SID: 100

    SRGB Base: 40000

Options:

A.

39002

B.

40002

C.

38002

D.

36002

Buy Now
Questions 6

In DU label advertisement mode, if the liberal label retention mode is used, the device reserves labels received from all the LDP peers regardless of whether the LDP peer is the optimal next hop for reaching the destination network.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 7

In a VXLAN scenario, which of the following features can be enabled to reduce ARP packet flooding between VTEPs?

Options:

A.

Local proxy ARP

B.

ARP broadcast suppression

C.

Host information collection

D.

Port isolation

Buy Now
Questions 8

Congestion management technology can be used to discard data packets in the buffer queue to prevent the buffer queue from being exhausted.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 9

At the NETCONF content layer, the <config> operation may contain an operation attribute, which is used to specify an operation type for configuration data. Which of the following operation attributes are supported?

Options:

A.

create: The configuration data identified by the element that contains this attribute is added to the configuration datastore only if the configuration data does not already exist in the configuration datastore. If it already exists in the configuration datastore, with the value being data-exists is returned.

B.

delete: The configuration data identified by the element that contains this attribute is deleted from the configuration datastore. If the configuration data does not exist in the configuration datastore, a deletion success message is returned.

C.

merge: The configuration data identified by the element that contains this attribute is modified if the configuration data already exists in the configuration datastore. If not, the configuration data is created in the datastore.

D.

remove: The configuration data identified by the element that contains this attribute is deleted from the configuration datastore. If the configuration data does not exist in the configuration datastore, a deletion success message is returned.

Buy Now
Questions 10

An engineer needs to download the configuration file vrpcfg.cfg to a local device through SFTP, rename the configuration file to backup.cfg, and upload it to the default directory of the device.

The configuration file is located at /vrpcfg.cfg (default directory of the remote device), and the local directory is C:\.

Which of the following Python Paramiko code lines can implement the required operations?

Options:

A.

sftp.get('/vrpcfg.cfg', r'C:\')

sftp.put(r'C:\backup.cfg', '/')

B.

sftp.get('/vrpcfg.cfg', r'C:\backup.cfg')

sftp.put(r'C:\backup.cfg', '/')

C.

sftp.get('/vrpcfg.cfg', r'C:\vrpcfg.cfg')

sftp.put('/backup.cfg', r'C:\vrpcfg.cfg')

D.

sftp.get('/vrpcfg.cfg', r'C:\backup.cfg')

sftp.put(r'C:\backup.cfg', '/backup.cfg')

Buy Now
Questions 11

On a campus network, iMaster NCE-Campus is used to deploy two VNs (Virtual Networks): R&D VN and Marketing VN. Users in these two VNs belong to two separate security groups.

The campus network requires R&D personnel and sales personnel to communicate with each other. To meet this requirement, which of the following tasks does a network administrator need to perform?

Options:

A.

Deploy network service resources.

B.

Deploy a policy control matrix.

C.

Configure inter-VN communication.

D.

Deploy an external network.

Buy Now
Questions 12

Which of the following statements about 802.1X authentication are correct?

Options:

A.

802.1X authentication uses EAPoL to exchange authentication information between the client, device, and authentication server.

B.

In EAP termination mode, EAP packets are terminated and re-encapsulated into RADIUS packets on the network access device. The network access device and AAA server use the standard RADIUS protocol to implement authentication, authorization, and accounting.

C.

EAPoL implements EAP encapsulation on an IEEE 802.3 network, whereas EAPoW implements EAP encapsulation on an IEEE 802.11 network.

D.

In EAP relay mode, EAP packets are directly encapsulated by the network access device into RADIUS packets (that is, EAP over RADIUS, or EAPoR). The network access device and AAA server use EAPoR to perform authentication, authorization, and accounting.

Buy Now
Questions 13

The on-premise mode is recommended for controller deployment on small and midsize campus networks.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 14

In Huawei Open Programmability System (OPS), /ifm/interfaces/interface is the URL used to identify a device's managed object.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 15

Which of the following are potential risks in HTTP communication?

Options:

A.

Eavesdropping: Third parties can obtain communication data.

B.

Pretending: Third parties can impersonate another user.

C.

Tampering: Third parties can tamper with communication data.

D.

Lost: There is a low probability that data is lost during transmission.

Buy Now
Questions 16

Which of the following languages is integrated into the OPS?

Options:

A.

Python

B.

C programming language

C.

Java

D.

C++

Buy Now
Questions 17

An HTTP request line consists of three fields. Select the fields to form a complete HTTP request message.

H12-891_V1.0 Question 17

Options:

Buy Now
Questions 18

Which of the following statements are correct about the command:

ping -aX -cY -sZ -vpn-instance M 10.5.16.2

Options:

A.

The source IP address of the ping packets is X.

B.

The ping packets belong to VPN instance M.

C.

During the ping operation, the quantity of ICMP Request packets is Y.

D.

The size of each ICMP Request packet for the ping operation is Z bytes.

Buy Now
Questions 19

What can be determined from the following figure?

H12-891_V1.0 Question 19

Options:

A.

R3 must be a Level-2 device.

B.

The device role of R3 cannot be determined.

C.

R3 must be a Level-1-2 device.

D.

R3 must be a Level-1 device.

Buy Now
Questions 20

In an MPLS VPN network, two-layer MPLS labels are added into data packets before they are transmitted over the public network. Which of the following statements regarding data packet processing are correct?

Options:

A.

The egress PE sends the data packet to the correct VPN based on the inner label.

B.

The penultimate hop removes the outer label before forwarding the data packet to a peer egress PE.

C.

The IP data packet received by egress LSR is without labels.

D.

The penultimate-hop device receives a packet with an outer label.

Buy Now
Questions 21

NAFTIR policing can only be applied to the inbound direction. Its purpose is to monitor the traffic entering the device and ensure that the upstream device does not unnecessarily consume network resources.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 22

As shown in the figure, ARP broadcast suppression is enabled on VTEP1 in BD 20 (VNI 200).

    VTEP1 learns ARP information about PC2 through BGP EVPN routes.

    When VTEP1 forwards the ARP request for PC1’s MAC address to VTEP2,

    What is the destination MAC address of the inner data frame?

H12-891_V1.0 Question 22

Options:

A.

MAC B

B.

MAC C

C.

MAC A

D.

MAC D

Buy Now
Questions 23

After the reset isis all command is run, the specified IS-IS process is reset, and all involved IS-IS neighbor relationships are re-established; however, IS-IS statistics are not cleared.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 24

The naming of SRv6 instructions complies with certain rules. You can quickly determine the function of an instruction based on the instruction name. Which of the following statements about the keywords in SRv6 instruction names are correct?

Options:

A.

T: searches a specified routing table to forward packets.

B.

M: searches a Layer 2 forwarding table for unicast forwarding.

C.

V: searches a VPN instance routing table to forward packets.

D.

X: forwards packets through one or a group of specified Layer 3 interfaces.

Buy Now
Questions 25

Huawei CloudCampus Solution has multiple application scenarios, and iMaster NCE-Campus provides different APIs for each application scenario. Match the following application scenarios with the open APIs provided by iMaster NCE-Campus.

Options:

Buy Now
Questions 26

An SRLB is a set of user-specified local labels reserved for SR-MPLS. These labels are locally configured and have only local significance. Therefore, they are not advertised through the IGP.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 27

Refer to the figure.

H12-891_V1.0 Question 27

Which of the following steps are mandatory to enable 802.1X authentication on GE0/0/2 and GE0/0/3 of SW3 and configure a RADIUS server to authenticate and deliver network access rights to users?

Options:

A.

Configure an AAA scheme.

B.

Configure an authentication profile.

C.

Configure an authentication domain.

D.

Configure an 802.1X access profile.

Buy Now
Questions 28

A network administrator runs the display telemetry destination command on a device to check information about a destination group that sampled data is sent to. The command output is as follows. Which of the following statements is incorrect?

[~CE-telemetry-sensor-group-Sensor1]display telemetry destination

Dest-name Dest-addr Dest-port State Vpn-name Protocol

Dest1 192.168.56.1 20000 RESOLVED - GRPC

Options:

A.

The IP address of the destination group is 192.168.56.1

B.

The destination group name is Dest1.

C.

VPN encapsulation is used for data push.

D.

The gRPC protocol is used for data push.

Buy Now
Questions 29

What can be determined from the following IS-IS peer output?

Peer information for ISIS(1):

    Peer System ID: ee8c.a0c2.baf3

    Interface: GE0/0/0

    State: Up

    HoldTime: 7s

    Type: L1

    PRI: 64

    MT IDs supported: 0(UP), 2(UP)

    Local MT IDs: 0, 2

    Area Address(es): 49.0022

    Peer IP Address(es): 10.1.34.1

    Peer IPv6 Address(es): FE80::2E0:FCFF:FE98:2576

Options:

A.

Both IPv4 and IPv6 IS-IS neighbor relationships are established between R4 and ee8c.a0c2.baf3.

B.

R4 does not have any IS-IS neighbors.

C.

Only an IPv4 IS-IS neighbor relationship is established between R4 and ee8c.a0c2.baf3.

D.

Only an IPv6 IS-IS neighbor relationship is established between R4 and ee8c.a0c2.baf3.

Buy Now
Questions 30

Which of the following functions can be provided by iMaster NCE-Campus when it functions as a relay agent for authentication?

Options:

A.

User accounting

B.

User authentication

C.

User analysis

D.

Marketing

Buy Now
Questions 31

The ingress VTEP performs both Layer 2 and Layer 3 table lookup for packet forwarding. The forwarding mode is _____ IRB forwarding. (Capitalize the first letter.)

Options:

Buy Now
Questions 32

Telemetry data must be encoded in GPB binary format. This format reduces the number of bytes in telemetry messages and improves the transmission efficiency compared with messages encoded in JSON format.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 33

Network administrator A wants to use an IP prefix-list to match specific routes. Which of the following routes can be matched by the IP prefix-list shown in this figure?

ip ip-prefix TEST permit 10.0.0.0 24 less-equal 30

Options:

A.

10.0.1.0/24

B.

10.0.2.0/24

C.

10.0.0.0/24

D.

10.0.0.1/30

Buy Now
Questions 34

Which of the following statements about BGP EVPN principles are correct in a scenario where a VXLAN tunnel is dynamically established through BGP EVPN?

Options:

A.

MP_REACH_NLRI is used to carry routing information.

B.

Several BGP EVPN routes are defined through BGP extension.

C.

MP_REACH_NLRI is used to carry the RD.

D.

MP_REACH_NLRI is used to carry the RT.

Buy Now
Questions 35

In the following figure, all routers are running OSPF. Given this, which of the following statements is correct?

H12-891_V1.0 Question 35

Options:

A.

R2 forwards the Router-LSAs generated by R1 to R3.

B.

R2 forwards the Router-LSAs generated by R3 to R1.

C.

R2 generates Router-LSAs only in area 0.

D.

R2 generates Router-LSAs in both area 1 and area 0.

Buy Now
Questions 36

BFD can implement millisecond-level link status detection.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 37

In SSP packages, Jinja2 templates are used to implement mapping. In the Jinja2 syntax, {% ... %} contains control structures, for example, a 'for' loop.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 38

Which of the following types of EVPN routes does not carry MPLS labels?

Options:

A.

Ethernet A-D route

B.

MAC/IP advertisement route

C.

Ethernet segment route

D.

Inclusive multicast route

Buy Now
Questions 39

In a scenario where a VXLAN tunnel is dynamically established through BGP EVPN, which of the following statements about symmetric IRB forwarding are correct?

Options:

A.

Both the ingress VTEP and egress VTEP forward packets based on the Layer 3 forwarding table.

B.

The ingress VTEP forwards packets based only on the Layer 2 forwarding table.

C.

The egress VTEP forwards packets based only on the Layer 2 forwarding table.

D.

When VTEPs forward inter-subnet user communication packets, the VNI carried in the VXLAN header is the L3VNI.

Buy Now
Questions 40

The path of an SR-MPLS TE tunnel can be calculated by the controller or tunnel ingress.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 41

Which of the following statements about BIER (Bit Index Explicit Replication) and PIM (Protocol Independent Multicast) are correct?

Options:

A.

On a BIER-based multicast network, packets sent by the multicast source must be encapsulated with the Bitstring field.

B.

On a PIM-based multicast network, an MDT covering all nodes that multicast traffic traverses needs to be established.

C.

On a BIER-based multicast network, an MDT covering all nodes that multicast traffic traverses does not need to be established.

D.

On a BIER-based multicast network, multicast users must send group join messages hop by hop.

Buy Now
Questions 42

A VGMP packet is encapsulated with a UDP header and a VGMP header. By default, a VGMP packet uses UDP port _____.

Options:

Buy Now
Questions 43

Which of the following commands is used to adjust the cost of an IS-IS interface?

Options:

A.

isis circuit-type

B.

isis timer hello

C.

isis cost

D.

isis circuit-level

Buy Now
Questions 44

With telemetry, certain data can be sampled based on specific sampling paths. Which of the following sampling paths are supported by telemetry?

Options:

A.

Interface statistics

B.

Information about the optical module on an interface

C.

CPU information

D.

Memory information

Buy Now
Questions 45

Which of the following is the type of northbound API used by iMaster NCE-WAN?

Options:

A.

NETCONF

B.

RESTful

C.

CLI

D.

SNMP

Buy Now
Questions 46

Which of the following statements does not cause the flapping of a VRRP group?

Options:

A.

Too small interval between Advertisement packet transmissions

B.

Inconsistent preemption delay settings

C.

Packet loss on an interface of the backup device

D.

Flapping on the link transmitting VRRP Advertisement packets

Buy Now
Questions 47

In the Huawei CloudCampus Solution, which of the following devices can go online through the registration query center?

Options:

A.

Switch

B.

AR

C.

AP

D.

Firewall

Buy Now
Questions 48

According to the following information displayed on a router, which of the following are the causes of the failure in establishing an OSPF adjacency relationship?

OSPF error statistics:

    1: Hello timer mismatch

    0: Netmask mismatch

    0: Bad checksum

    0: Bad authentication type

    0: Unknown neighbor

    0: Extern option mismatch

Options:

A.

Hello packets are sent at different intervals.

B.

The area IDs are inconsistent.

C.

The IP address masks of the interfaces are inconsistent.

D.

The area types are inconsistent.

Buy Now
Questions 49

Flavors are additional behaviors defined to enhance the End series instructions in SRv6. Which of the following End instructions can the PSP flavor be attached to?

Options:

A.

End.X

B.

End.BM

C.

End.T

D.

End

Buy Now
Questions 50

In a scenario where a VXLAN tunnel is dynamically established through BGP EVPN, which of the following statements about symmetric IRB forwarding are correct?

Options:

A.

When VTEPs forward inter-subnet user communication packets, the VNI carried in the VXLAN header is the L3VNI.

B.

Both the ingress VTEP and egress VTEP forward packets based on the Layer 3 forwarding table.

C.

The ingress VTEP forwards packets based only on the Layer 2 forwarding table.

D.

The egress VTEP forwards packets based only on the Layer 2 forwarding table.

Buy Now
Questions 51

Before connecting an SSH client to an SSH server in public key authentication mode, a client needs to create a key pair. Which of the following commands is used to create a DSS key pair on the client using Git Bash?

Options:

A.

ssh-keygen -t dss

B.

ssh-keygen -t ecc

C.

ssh-keygen -t dsa

D.

ssh-keygen -t rsa

Buy Now
Questions 52

On a CloudCampus virtualized campus network, virtual networks are defined based on services. Each virtual network corresponds to a service, and isolation needs to be manually configured between virtual networks.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 53

Which of the following inter-AS MPLS L3VPN solutions needs ASBRs to transmit VPNv4 routes?

Options:

A.

Option C

B.

Option B

C.

Option A

D.

Option D

Buy Now
Exam Code: H12-891_V1.0
Exam Name: HCIE-Datacom V1.0
Last Update: Apr 3, 2025
Questions: 177

PDF + Testing Engine

$49.5  $164.99

Testing Engine

$37.5  $124.99
buy now H12-891_V1.0 testing engine

PDF (Q&A)

$31.5  $104.99
buy now H12-891_V1.0 pdf
dumpsmate guaranteed to pass
24/7 Customer Support

DumpsMate's team of experts is always available to respond your queries on exam preparation. Get professional answers on any topic of the certification syllabus. Our experts will thoroughly satisfy you.

Site Secure

mcafee secure

TESTED 03 Apr 2025